Cyber Security Summit

Please note that our next Summit will be held on Tuesday, October 4th 2016. Look for event details to come.

Event Contact information and Documents

Laura Catherman, President, WOW Workforce Development Board

  • Presentation- Cyber Security: Workforce Trends & Labor Market Information
  • View document here.
  • Contact info: lcatherman@wctc.edu

Lisa Kaiser, Computer Scientist, Department of Homeland Security, Cyber Security & Communications (CS&C), Chief Technology Office (CTO)

  • Presentation- National Protection and Programs Directorate
  • View document here.
  • Contact Info: Lisa.Kaiser@dhs.gov

Joe Cicero, Network Specialist Instructor, Northeast Wisconsin Technical College

  • Presentation— Free, Easy and Lazy: Enemies to Privacy and Security
  • View document here.
  • Contact: joe.cicero@nwtc.edu

Byron Franz, Special Agent, FBI, InfraGard

  • Presentation- Protecting Wisconsin Business from the Cyber Threat
  • Contact: Byron.franz@ic.fbi.gov

Jason Lang, Senior Information Assurance Consultant, SynerComm

  • Presentation- Social Engineering 101: Tips for Preventing Real Attacks
  • View document here.
  • Contact: Jason.Lang@synercomm.com

Adam Perella, Manager, 403 Labs

  • Presentation- Managing Security with Third-Party Vendors
  • View Prezi
  • Contact: APerella@sikich.com

Zach Grace, Lead Web Application Security Consultant, Northwestern Mutual

  • Presentation- Beyond Prevention, Assume Breach
  • View document here.
  • Contact: ztgrace@gmail.com

Kevin Bong, Manager - Financial Institutions, 403 Labs

  • Presentation- Intro to Hardware Hacking and RFID
  • View document here.
  • Contact: KBong@sikich.com

CYA – Cover Your Assets
A Data Privacy Day Event

Are your assets as secure as you think?

In today's business, our data is one of our most important assets. There are many challenges we all must face in this ever-changing environment that put our data at risk. We will explore emerging threats, gain new insights about perpetual threats, and learn new methods to "Cover your assets" as they are becoming increasingly exposed.

Where

Waukesha County Technical College
Richard T. Anderson Education Center (RTA)
800 Main Street
Pewaukee, WI 53072

When

Thursday, January 28, 2016
7:30 a.m. - 12:30 p.m.

No cost; light breakfast provided.

Recommended for:

Anyone interested in strengthening their cyber security defense -- CEOs, CIOs, small business owners, IT security decision makers, IT professionals, non-profit leaders, educational partners and local government representatives.

Agenda

Opening Remarks:

Kaylen Betzig, President, Waukesha County Technical College

CyndiKaye Medved, Associate Dean – Business Information Technology, Waukesha County Technical College

Laura Catherman, Vice President, WOW Workforce Development Board

Eric Huemmer, Community Engagement Coordinator, Waukesha County Business Alliance

Keynote: IACD…The Next Generation of Cyber Security

Lisa Kaiser, Computer Scientist, Department of Homeland Security, Cyber Security & Communications (CS&C), Chief Technology Office (CTO)

In this keynote, learn about the future of cyber security. The country’s cyber ecosystems remain vulnerable to attack, and therefore, we must remain vigilant. Policies like Executive Order: Improving Critical Infrastructure Cybersecurity, and Presidential Policy Directive: Critical Infrastructure Security and Resilience reinforce the need for holistic thinking about cybersecurity and risk management that drives action toward critical infrastructure network security and resiliency.

Lisa Kaiser is a computer scientist within the Department of Homeland Security (DHS) US-CERT who is presently on a special project detail to the Chief Technology Office. Her prior role at DHS was within the Industrial Control Systems – Cybersecurity Emergency Response Team (ICS-CERT) -- where she played a leading role in developing the strategic direction for reducing control systems cyber security risk.

Keynote: Free, Easy and Lazy: Enemies to Privacy and Security

Joe Cicero, Network Specialist Instructor, Northeast Wisconsin Technical College

In this presentation, attendees will learn tools and tactics to increase their privacy on the Internet. Cicero will provide evidence to show how customers react when large corporations lose their data, and he will present research on the privacy individuals lose when installing and using FREE applications, programs and Internet websites.

Joe Cicero has worked with local law firms as a Computer Forensic Expert and performed on-site and in-house forensic examinations for both criminal and civil cases. He has held numerous positions covering the realm of information technology.

Protecting Wisconsin Business from the Cyber Threat

Byron Franz, Special Agent, FBI, InfraGard

The FBI estimates that the theft of intellectual property may cost the U.S. up to $400 billion per year. Much of this is due to exfiltration or cyber espionage. In this presentation, discover best practices for the detection and mitigation of cyber intrusion actors who target corporate computer networks and portable electronic devices. Learn the importance of fostering public-private partnerships and the role of the FBI in combating these threats.

Pick a Track:

Track 1 – Business Track

Social Engineering 101: Tips for Preventing Real Attacks

Jason Lang, Senior Information Assurance Consultant, SynerComm

Curious about how social engineering is used to break into organizations? It is one of the most effective tools in an attacker's toolbox. In this presentation, learn about examples of social engineering attacks that have been used in penetration tests as well as effective strategies for thwarting them.

Managing Security with Third-Party Vendors

Adam Perella, Manager, 403 Labs

In this presentation, examine real-world scenarios and discuss a variety of business models in which organizations rely upon third-party vendors for business functions, such as hosting provided by data centers, managed services and IT support. In these instances, understanding responsibilities, identifying associated vulnerabilities and appropriately managing the third parties can reduce risk.

Track 2 – Technical Track

Beyond Prevention, Assume Breach

Zach Grace, Lead Web Application Security Consultant, Northwestern Mutual

The security landscape has changed, and simply focusing on prevention is no longer an effective strategy. In this presentation, look at the idea of Assume Breach and how detection and response to threats aligns to an attacker methodology. Demonstrations and research will highlight how organizations can achieve more finely tuned detection capabilities through threat simulation and war-game exercises.

Intro to Hardware Hacking and RFID

Kevin Bong, Manager - Financial Institutions, 403 Labs

While hardware hacking can be intimidating for hobbyist hackers, it doesn’t need to be. Learn some basic electronics concepts and hardware hacking tools and techniques you can combine with a “figure it out as you go” attitude to start doing your own hardware enhancements. These concepts will be presented through a real-world example – how to inspect the workings of an inexpensive RFID lock, turn it into an RFID badge snooper and then build an RFID badge spoofer.

First Name

Last Name

Position

Organization

Address

City

State

Zip

Email Address

Phone Number

Waukesha County Technical College is committed to accessibility for persons with disabilities. Please provide details if you have any accommodation requirements.

Please drag and drop the sessions you'd like to attend to rank them by most desired at the top to least desired at the bottom.

  • Session 1
  • Session 2
  • Session 3
  • Session 4
  • Session 5
  • Session 6
  • Session 7

-->

Sponsored by:

Sponsors

Interface logo

The expanded Network Enterprise Administrator – INTERFACE Accelerated training opportunities are available thanks to a TAACCCT grant, and priority is given to veterans and TAA workers (those who lost jobs due to layoffs as a result of foreign trade). The $23.1 million grant from the U.S. Department of Labor’s Trade Adjustment Community College and Career Training (TAACCCT) Grant, which is shared among Wisconsin’s 16 technical colleges, has made this training possible.

To learn more about how the grant supports programming, contact the IT Skills and Placement Coordinator, at 262.691.5335.